@ljrk Apologies if I'm misunderstanding what you were saying. I'm just trying to point out that the use of malicious cables to infect mobile devices is extremely difficult. Specifically:
"There are some major limitations, however, that make the O.MG Cable and similar hacking tools unsuitable for the kind of opportunistic juice jacking the FCC and FBI warnings envision. First, the script must be tailored to the specific model of hardware being attacked. The script needed to hack a Samsung Galaxy phone will be different from the one needed to hack a Motorola. A script targeting an iPhone would be altogether different.
That means it’s infeasible, if not impossible, to create a malicious charging station that could hack more than a very small number of phones in use today. That still leaves open the possibility of a fake charging station that targets, say, only iPhone 14 or Pixel 7 models, but it significantly limits the reach of such attacks.
Another shortcoming is that the OTG adaptor turns the phone into a USB host, meaning the phone—which is already running low on battery power—must supply power to the cable rather than the other way around. This limitation undermines the whole subterfuge of a charging station and may also kill the remaining battery life before an attack has a chance to progress.
For iPhones, the O.MG cable is even more poorly suited to juice jacking. For one, iPhones require users to enter a password (or provide a facial scan) before an app will install. (The Pixel 7 I tested did not; some Android devices may.) That requirement significantly limits the effectiveness of the attack.
Additionally, the O.MG cable works only on Apple devices equipped with a USB-C connector. To hack an iOS device with a Lightning connector, a juice jacker would need an additional Lightning adapter that would be physically obvious to the person using the booby-trapped charger.
There are at least two other theoretically possible methods. One is targeting the debugging interface of the connected phone. There are several off-the-shelf products that allow hackers to interact with the debug interface on phones. For iPhones, there's the Tamarin "cable," but that has an easy-to-spot Raspberry Pi hanging off of it. Also problematic: Like the O.MG, these devices can't charge a phone when they're accessing the file system of the connected device.
The other possible method uses newer, more experimental types of hardware that allow charging even while turning the iPhone into a USB Host. This video demonstrates a prototype of such hardware.
Finally, besides there being no universal script that will work on hundreds or even dozens of different devices, the customized scripts are non-trivial to write. They require a high skill level and a huge amount of trial-and-error troubleshooting."
It may be easier to use something like an O.MG cable to infect a macOS or Windows device, though.